Home
last modified time | relevance | path

Searched refs:secure_boot_v1 (Results 1 – 7 of 7) sorted by relevance

/hal_espressif-latest/components/bootloader_support/src/
Dsecure_boot.c199 bool secure_boot_v1 = esp_efuse_read_field_bit(ESP_EFUSE_ABS_DONE_0); in esp_secure_boot_cfg_verify_release_mode() local
202 result = secure_boot_v1 || secure_boot_v2; in esp_secure_boot_cfg_verify_release_mode()
203 if (secure_boot_v1 && secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()
206 } else if (!secure_boot_v1 && !secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()
214 if (secure_boot_v1 && !secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/
Dburn-bit-cmd.rst29 …BLOCK2 (secure_boot_v1 s) [2 ] regs_to_write: 001f8000 00000000 00000000 00000000 0000000…
53 …BLOCK2 (secure_boot_v1 s) [2 ] regs_to_write: 001f8000 00000000 00000000 00000000 0000000…
Ddump-cmd.rst42 …BLOCK2 (secure_boot_v1 s) [2 ] read_regs: 00000000 00000000 00000000 00000000 00000000 00…
Dburn-key-cmd.rst47 …* Secure boot key. Use ``secure_boot_v1`` or ``secure_boot_v2`` as block name. The key is placed i…
50 …Keys for ``flash_encryption`` and ``secure_boot_v1`` will be burned as read and write protected. T…
149 espefuse.py burn_key secure_boot_v1 secure_boot_key_v1.bin
/hal_espressif-latest/components/bootloader_support/
DCMakeLists.txt65 list(APPEND srcs "src/secure_boot_v1/secure_boot_signatures_bootloader.c")
68 list(APPEND srcs "src/secure_boot_v1/secure_boot.c"
81 list(APPEND srcs "src/secure_boot_v1/secure_boot_signatures_app.c")
/hal_espressif-latest/components/bootloader/subproject/
DCMakeLists.txt186 "\t${espefusepy} burn_key secure_boot_v1 ${secure_bootloader_key}"
/hal_espressif-latest/tools/esptool_py/test/
Dtest_espefuse.py1794 secure_boot_v1 {IMAGES_DIR}/256bit_1 --no-protect-key"
1807 secure_boot_v1 {IMAGES_DIR}/256bit_1"